Author(s): Narendra K. Dewangan, Manisha Dewangan

Email(s): narendra.nic@gmail.com

DOI: Not Available

Address: Narendra K. Dewangan* and Manisha Dewangan
Department of MCA, Raipur Institute of Technology, Raipur, Chhattisgarh, INDIA 492001
*Corresponding Author

Published In:   Volume - 2,      Issue - 4,     Year - 2011


ABSTRACT:
Internet based communications are evolving at a tremendous rate. Encryption of data has become an important way to protect data resources especially on the Internet, intranet sand extranets. Encryption involves applying special mathematical algorithms and keys to transform digital data into cipher code before they are transmitted and decryption involves the application of mathematical algorithms and keys to get back the original data from cipher code. The goal of security management is to provide authentication of users, and integrity, accuracy and safety of data resources. Moreover, an image-based data requires more effort during encryption and decryption. The model for encryption and decryption of an image using auto generated key which is generated by image. The Internet has facilitated the development of a worldwide ‘Virtual Community’ free from the constraints of time and geography. Due to the Internet there is no distance between a person located in one place and experts around the globe. Through electronic mail / voice mail / video mail it is possible to solicit the opinion of experts. Moreover, Telemedicine is becoming popular in the specialties of radiology, pathology, critical care and psychiatry, where data is in the form of image. It is required to ensure confidentiality and security for transmitting certain image-based data over the Internet. The aim of security management is to provide authentication of users and integrity, accuracy and safety of data resources. The model for encryption and decryption of an image is designed with the same purposes


Cite this article:
Narendra K. Dewangan, Manisha Dewangan. Image Encryption and Decryption Using Auto Generated Key. Research J. Engineering and Tech. 2(4): Oct. - Dec. 2011 page 219-222.

Cite(Electronic):
Narendra K. Dewangan, Manisha Dewangan. Image Encryption and Decryption Using Auto Generated Key. Research J. Engineering and Tech. 2(4): Oct. - Dec. 2011 page 219-222.   Available on: https://ijersonline.org/AbstractView.aspx?PID=2011-2-4-7


Recomonded Articles:

Author(s): Amirta R, Deepika Menon S, Ramya G Franklin

DOI: 10.5958/2321-581X.2020.00002.1         Access: Open Access Read More

Author(s): Love Verma, Ram Nivas Giri

DOI:         Access: Open Access Read More

Author(s): Jaspreet Kaur, Rajdeep Singh Sohal

DOI: 10.5958/2321-581X.2017.00009.5         Access: Open Access Read More

Author(s): Narendra K. Dewangan, Manisha Dewangan

DOI:         Access: Open Access Read More

Author(s): Deepak Kumar

DOI:         Access: Open Access Read More

Author(s): Sakshi Shrivastava, Siddhartha Choubey

DOI:         Access: Open Access Read More

Author(s): M. Venu Gopala Rao, M. Babita Jain , Purvi Shukla

DOI:         Access: Open Access Read More

Author(s): Ashutosh Patel , A.K. Denial

DOI:         Access: Open Access Read More

Author(s): T.Jaspar Vinitha Sundari, K. Karthika

DOI: 10.5958/2321-581X.2017.00051.4         Access: Open Access Read More

Author(s): Rajdeep Chowdhury, Saikat Ghosh

DOI:         Access: Open Access Read More

Author(s): Manjusha Tikariha, Amar Kumar Dey

DOI:         Access: Open Access Read More

Author(s): Sheena Mohammed, Madhuri Dachepally, A Annapurna

DOI: 10.5958/2321-581X.2015.00063.X         Access: Open Access Read More

Author(s): Shabnam Chandrakar, Harsha Verma, Rubi Kambo

DOI: 10.5958/2321-581X.2020.00019.7         Access: Open Access Read More

Author(s): Mohan Awasti, Navneet Kumar Sahu, M.K. Kowar

DOI:         Access: Open Access Read More

Research Journal of Engineering and Technology (RJET) is an international, peer-reviewed, research journal aiming at promoting and publishing original high quality research in all disciplines of engineering sciences and technology....... Read more >>>

RNI: Not Available                     
DOI: 10.5958/2321-581X 


Recent Articles




Tags